Table, the unit of data created in the instance. An instance can contain multiple tables, and each table contains rows and columns. The name of the table is unique in the instance. You can create a table with the same name in different instances.
It is a computing framework that runs on YARN and supports DAG jobs. For details, please see: http://tez.apache.org/
It represents an IoT Hub device, and users can create one or more things in each endpoint.
Each policy needs to specify a topic. Before using the IoT Hub service, you need to create a topic name for our upcoming subscription publication information. This topic applies to the MQTT client. The topic rule allows strings to have a wildcard "#". For example, "temperature/#" matches all topics whose prefix is temperature; a single "#" matches all topics.
Transmission Control Protocol
Transmission Control Protocol (TCP) is a connection-oriented, reliable, IP-based Layer 4 transport layer protocol, specified by RFC 793 of the IETF. The protocol number of TCP in IP packets is 6.
Time Series Database, used to save massive data in time series (change in chronological order).
Automatic scaling rules
The automatic scaling rules are used to stipulates the time of scaling up or down of the scaling group, as well as the number of nodes scaling up.
SkyEngineering IoT Card
Baidu AI Cloud SkyEngineering and China Unicom jointly launched the IoT card, which adopt 13-digit number segment, and support dedicated sending to SkyEngineering IoT Hub.
A service, that performs real-time processing such as scaling, cropping, format conversion, rotation, and watermarking of a media cover Photo (cover) and returns the processing result to the user in real time through the CDN, is called a picture service.
In order to ensure that the streaming channel is not illegally occupied (To prevent illegal streaming), the live video and audio LSS supports the use of a push URL with token authentication, that can be set to have a valid period. Support users to use push authentication to protect the security of live audio and video distribution. After the push authentication is enabled, the live push address can be set with a validity period. After the validity period expires, the address will be invalid, and the push address needs to be obtained again. Turn off push authentication, and the live push address is fixed.